CVE-2025-1478
BaseFortify
Publication date: 2025-06-12
Last updated on: 2025-08-08
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gitlab | gitlab | From 8.13.0 (inc) to 17.10.7 (exc) |
| gitlab | gitlab | From 8.13.0 (inc) to 17.10.7 (exc) |
| gitlab | gitlab | From 17.11.0 (inc) to 17.11.3 (exc) |
| gitlab | gitlab | From 17.11.0 (inc) to 17.11.3 (exc) |
| gitlab | gitlab | 18.0.0 |
| gitlab | gitlab | 18.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a lack of input validation in GitLab CE/EE Board Names that can be exploited to trigger a denial of service (DoS) condition. It affects all versions from 8.13 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1.
How can this vulnerability impact me? :
The vulnerability can cause a denial of service, meaning that the affected GitLab instance could become unavailable or unresponsive, disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
Update GitLab CE/EE to version 17.10.7, 17.11.3, 18.0.1 or later, as these versions contain the fix for the denial of service vulnerability caused by lack of input validation in Board Names.